cent7362 Posted March 22, 2014 Share Posted March 22, 2014 I am using se-toolkit to do a Reverse TCP Meterpreter, creating a backdoor executable. I start the listener, and this is what I get. It seems to get stuck here. Quote Link to comment Share on other sites More sharing options...
cooper Posted March 22, 2014 Share Posted March 22, 2014 Prior to starting, was some process already listening on 443? Quote Link to comment Share on other sites More sharing options...
cent7362 Posted March 22, 2014 Author Share Posted March 22, 2014 no. Quote Link to comment Share on other sites More sharing options...
Sebkinne Posted March 22, 2014 Share Posted March 22, 2014 Are you running as root? Quote Link to comment Share on other sites More sharing options...
i8igmac Posted March 22, 2014 Share Posted March 22, 2014 Learn how to generate the payload with msfpayload. Then start exploit/multihandler... don't rely on others scripts. Quote Link to comment Share on other sites More sharing options...
cent7362 Posted March 23, 2014 Author Share Posted March 23, 2014 Are you running as root? Yes. Quote Link to comment Share on other sites More sharing options...
i8igmac Posted March 23, 2014 Share Posted March 23, 2014 Netstat -nlp | grep 443 Quote Link to comment Share on other sites More sharing options...
cent7362 Posted March 23, 2014 Author Share Posted March 23, 2014 Nope. Just something running on 7443. Quote Link to comment Share on other sites More sharing options...
i8igmac Posted March 24, 2014 Share Posted March 24, 2014 http://synjunkie.blogspot.com/2008/10/metasploit-payloads-msfpayload.html?m=1 Nice example use of msfcli ! generating a payload and setting up the exploit handler is 2 commands... try the vnc payload :-) Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.